METHOD AND SYSTEM FOR TRACKING FRAUDULENT ACTIVITY
First Claim
1. A system for tracking potentially fraudulent activity, the system including;
- a fraud tracking database; and
a fraud tracking server connected to the fraud tracking database, the fraud tracking server including;
a memory;
one or more processors coupled to the memory and configured to;
receive data identifying a potential spoof site;
generate a spoof site tracking record stored in the fraud tracking database, the spoof site tracking record including the data identifying the potential spoof site;
assign a spoof page identifier to a document associated with an actual spoof site based on unique characteristics of the document;
automatically monitor the actual spoof site to determine whether the actual spoof site is still active by periodically attempting to access the document associated with the actual spoof site; and
update the spoof site tracking record by adding to the spoof site tracking record data indicating whether or not the document was accessible during the automatic monitoring.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for tracking potentially fraudulent activities associated with one or more web sites is disclosed. The system includes a fraud tracking server connected to a fraud tracking database. The fraud tracking server includes a communications module to facilitate the exchange of data between the server and multiple client devices. The fraud tracking server receives data from one or more client devices that identifies a potential spoof site. The fraud tracking server also includes control logic to generate a spoof site tracking record in the fraud tracking database. The spoof site tracking record includes the data identifying the potential spoof site. After the spoof site tracking record has been created, the fraud tracking server notifies an administrator of the potential spoof site by communicating the data received and stored in the fraud tracking database to an administrator.
33 Citations
20 Claims
-
1. A system for tracking potentially fraudulent activity, the system including;
-
a fraud tracking database; and a fraud tracking server connected to the fraud tracking database, the fraud tracking server including; a memory; one or more processors coupled to the memory and configured to;
receive data identifying a potential spoof site;generate a spoof site tracking record stored in the fraud tracking database, the spoof site tracking record including the data identifying the potential spoof site; assign a spoof page identifier to a document associated with an actual spoof site based on unique characteristics of the document; automatically monitor the actual spoof site to determine whether the actual spoof site is still active by periodically attempting to access the document associated with the actual spoof site; and update the spoof site tracking record by adding to the spoof site tracking record data indicating whether or not the document was accessible during the automatic monitoring. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
receiving data identifying a potential spoof site; generating, by a processor of a machine, a spoof site tracking record stored in a fraud tracking database, the spoof site tracking record including the data identifying the potential spoof site; assigning a spoof page identifier to a document associated with an actual spoof site based on unique characteristics of the document; automatically monitoring, by the processor of the machine, the actual spoof site to determine whether the actual spoof site is still active by periodically attempting to access the document associated with the actual spoof site; adding to the spoof site tracking record data indicating whether or not the document was accessible during the automatic monitoring of the actual spoof site. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A non-transitory machine-readable medium storing a set of instructions that, when executed by the machine, cause the machine to perform operations comprising:
-
receiving data identifying a potential spoof site; generating a spoof site tracking record in a fraud tracking database, the spoof site tracking record including the data identifying the potential spoof site; assigning a spoof page identifier to a document associated with an actual spoof site based on unique characteristics of the document; automatically monitoring the actual spoof site to determine whether the actual spoof site is still active by periodically attempting to access the document associated with the actual spoof site; and adding to the spoof site tracking record data indicating whether or not the document was accessible during the automatic monitoring of the actual spoof site. - View Dependent Claims (19, 20)
-
Specification